{"id":393,"date":"2023-10-02T22:22:45","date_gmt":"2023-10-02T22:22:45","guid":{"rendered":"https:\/\/digisentinel.org\/?p=393"},"modified":"2023-10-18T15:53:31","modified_gmt":"2023-10-18T15:53:31","slug":"security-practice-questions","status":"publish","type":"post","link":"https:\/\/digisentinel.org\/index.php\/2023\/10\/02\/security-practice-questions\/","title":{"rendered":"Security Practice Questions &#8211; Oct 2023"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The questions provided below are not sourced from any question bank. They are designed to assess your knowledge across various domains in cybersecurity. While these questions can be utilized as practice for a range of certifications, including but not limited to Security+, CISSP, and CISM, it&#8217;s important to note that they are generic. The format of questions and answers for a specific exam might differ from the format presented here.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Practice 1<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Cryptography &amp; PKI<\/strong>:<br>Which of the following is an asymmetric encryption algorithm? <br>a) DES <br>b)AES <br>c) RC4 <br>d) RSA<\/summary>\n<p class=\"wp-block-paragraph\"><strong>RSA<\/strong> is an asymmetric encryption algorithm, meaning it uses a pair of keys (public and private) for encryption and decryption.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DES<\/strong>, <strong>AES<\/strong>, and <strong>RC4<\/strong> are symmetric encryption algorithms, which use a single key for both encryption and decryption.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Network Security<\/strong>:<br>Which of the following devices specifically analyzes traffic for malicious content and can block specific content based on policy? <br>a) Router <br>b) Switch <br>c) IDS <br>d) IPS<\/summary>\n<p class=\"wp-block-paragraph\"><strong>IPS (Intrusion Prevention System)<\/strong> analyzes traffic in real-time and takes action based on policies, such as blocking malicious content.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Routers<\/strong> direct traffic based on IP addresses.<\/li>\n\n\n\n<li><strong>Switches<\/strong> direct traffic based on MAC addresses.<\/li>\n\n\n\n<li><strong>IDS (Intrusion Detection System)<\/strong> only detects and alerts about potential threats but doesn&#8217;t take automatic actions like blocking.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Threats &amp; Vulnerabilities<\/strong>:<br>A security administrator receives an alert from a system. Upon investigation, it is determined that there is no actual threat. What type of alert is this? <br>a) True negative <br>b) True positive <br>c) False negative <br>d) False positive<\/summary>\n<p class=\"wp-block-paragraph\">A <strong>false positive<\/strong> is an alert that incorrectly indicates the presence of a threat.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <strong>true positive<\/strong> is a correct identification of a threat.<\/li>\n\n\n\n<li>A <strong>true negative<\/strong> is a correct identification that there&#8217;s no threat.<\/li>\n\n\n\n<li>A <strong>false negative<\/strong> means the system failed to detect an actual threat.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Risk Management<\/strong>:<br>Which process is primarily concerned with identifying vulnerabilities and threats and assessing their potential impact? <br>a) Risk acceptance <br>b) Risk mitigation <br>c) Risk transference <br>d) Risk assessment<\/summary>\n<ol class=\"wp-block-list\">\n<li><strong>Risk assessment<\/strong> is the process of identifying vulnerabilities and threats and assessing their potential impact to an organization.\n<ul class=\"wp-block-list\">\n<li><strong>Risk acceptance<\/strong> is acknowledging the risk and deciding to proceed.<\/li>\n\n\n\n<li><strong>Risk mitigation<\/strong> is reducing the impact or likelihood of the risk.<\/li>\n\n\n\n<li><strong>Risk transference<\/strong> is shifting the risk to a third party (e.g., insurance).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>A <strong>fingerprint scanner<\/strong> falls under &#8220;Something you are&#8221; because it reads a physical<\/li>\n<\/ol>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Identity &amp; Access Management<\/strong>:<br>Which authentication factor category does a fingerprint scanner belong to? <br>a) Something you know <br>b) Something you have <br>c) Something you are <br>d) Somewhere you are<\/summary>\n<p class=\"wp-block-paragraph\">A <strong>fingerprint scanner<\/strong> falls under &#8220;Something you are&#8221; because it reads a physical characteristic of the user.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&#8220;Something you know&#8221; would be a password or PIN.<\/li>\n\n\n\n<li>&#8220;Something you have&#8221; would be a smart card or token.<\/li>\n\n\n\n<li>&#8220;Somewhere you are&#8221; would refer to a location-based factor like geofencing.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Security Architecture &amp; Design<\/strong>:<br>Which of the following concepts ensures that data is not altered or tampered with during transit? <br>a) Availability <br>b) Integrity <br>c) Confidentiality <br>d) Authentication<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Integrity<\/strong> ensures that data remains unchanged during storage or transmission, preventing unauthorized tampering.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Availability<\/strong> ensures that data\/services are available when needed.<\/li>\n\n\n\n<li><strong>Confidentiality<\/strong> ensures that data remains hidden from unauthorized users.<\/li>\n\n\n\n<li><strong>Authentication<\/strong> verifies the identity of a user or system.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Security Operations<\/strong>:<br>Which of the following best describes a honeypot? <br>a) A system used to distract attackers from critical systems <br>b) A patch applied to a software vulnerability <br>c) A secure area of a network where sensitive data is stored <br>d) A tool for encrypting data in transit<\/summary>\n<p class=\"wp-block-paragraph\">A <strong>honeypot<\/strong> is designed to attract and divert attackers from the main systems, acting as a decoy.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <strong>patch<\/strong> fixes software vulnerabilities.<\/li>\n\n\n\n<li>A <strong>secure area of a network<\/strong> is not necessarily a honeypot.<\/li>\n\n\n\n<li>A <strong>tool for encrypting data in transit<\/strong> refers to solutions like VPNs or SSL\/TLS, not honeypots.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Physical Security<\/strong>:<br>Tailgating is a concern for which of the following security controls? <br>a) Logical access controls <br>b) Firewalls <br>c) IDS systems <br>d) Physical access controls<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Tailgating<\/strong> is when an unauthorized person follows an authorized person into a secure area, so it concerns <strong>physical access controls<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Logical access controls<\/strong> deal with digital access, like passwords.<\/li>\n\n\n\n<li><strong>Firewalls<\/strong> and <strong>IDS systems<\/strong> are network security devices.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Application Security<\/strong>:<br>During which phase of the Software Development Life Cycle (SDLC) is security testing primarily performed? <br>a) Requirements phase <br>b) Design phase <br>c) Implementation phase <br>d) Verification phase<\/summary>\n<p class=\"wp-block-paragraph\">During the <strong>Verification phase<\/strong> of the SDLC, security testing primarily occurs to ensure the software is secure before deployment.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>Requirements phase<\/strong> involves gathering requirements, not testing.<\/li>\n\n\n\n<li>The <strong>Design phase<\/strong> is about designing the solution.<\/li>\n\n\n\n<li>The <strong>Implementation phase<\/strong> involves coding the software.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Incident Response<\/strong>:<br>Which of the following best describes the primary purpose of a Computer Security Incident Response Team (CSIRT)? <br>a) To develop and maintain an organization\u2019s security policy <br>b) To conduct routine security audits <br>c) To respond to and manage security incidents <br>d) To implement security infrastructure<\/summary>\n<p class=\"wp-block-paragraph\">A <strong>CSIRT&#8217;s primary purpose<\/strong> is to respond to and manage security incidents when they occur.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Developing\/maintaining an organization\u2019s security policy or conducting routine audits is not the primary focus of CSIRT.<\/li>\n\n\n\n<li>Implementing security infrastructure is more related to IT or security engineering teams.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Practice 2<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What is the primary purpose of using HTTPS over HTTP?<\/strong><br>a) Faster data transmission<br>b) Improved website layout<br>c) Data integrity and confidentiality<br>d) Higher availability<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Data integrity and confidentiality<br><em>Explanation:<\/em><br>HTTPS ensures data integrity and confidentiality through SSL\/TLS encryption.<br>HTTP offers no encryption, thus exposing data to potential eavesdropping.<br>Faster data transmission and improved website layout are not functions of HTTPS.<br>Availability refers to system uptime, not data security.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which type of attack involves intercepting communication between two parties without their knowledge?<\/strong><br>a) Phishing<br>b) DDoS<br>c) MITM (Man in the Middle)<br>d) Brute Force<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) MITM (Man in the Middle)<br><em>Explanation:<\/em><br>MITM attacks involve an attacker secretly intercepting and possibly altering the communication between two parties.<br>Phishing is a type of scam targeting users to gain personal information.<br>DDoS attacks flood services with traffic, causing unavailability.<br>Brute Force attacks attempt multiple password combinations to gain unauthorized access.<\/p>\n<\/details>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which protocol operates at the transport layer and offers connection-oriented communication?<\/strong><br>a) ICMP<br>b) UDP<br>c) TCP<br>d) ARP<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) TCP<br><em>Explanation:<\/em><br>TCP provides connection-oriented communication and operates at the transport layer.<br>ICMP is used for error reporting and diagnostics.<br>UDP offers connectionless communication.<br>ARP is used for IP to MAC resolution.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which cryptographic method uses the same key to encrypt and decrypt data?<\/strong><br>a) Asymmetric<br>b) Symmetric<br>c) Hash function<br>d) Digital signature<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Symmetric<br><em>Explanation:<\/em><br>Symmetric encryption uses the same key for both encryption and decryption.<br>Asymmetric encryption uses a pair of keys: one for encryption and one for decryption.<br>Hash functions generate a fixed-size string of bytes, typically a digest.<br>Digital signatures provide authentication, integrity, and non-repudiation.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What is the primary goal of a Business Continuity Plan (BCP)?<\/strong><br>a) Detect cyber attacks<br>b) Maintain business operations during incidents<br>c) Recover lost data<br>d) Test network vulnerabilities<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Maintain business operations during incidents<br><em>Explanation:<\/em><br>The BCP focuses on ensuring business operations continue during and after incidents.<br>Detecting cyber attacks is more associated with IDS\/IPS systems.<br>Recovering lost data is a focus of a Disaster Recovery Plan (DRP).<br>Testing network vulnerabilities is part of penetration testing.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What technology can best ensure data at rest encryption on a hard drive?<\/strong><br>a) Firewall<br>b) WAF (Web Application Firewall)<br>c) Full Disk Encryption (FDE)<br>d) Proxy<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Full Disk Encryption (FDE)<br><em>Explanation:<\/em><br>FDE ensures that all data on a hard drive is encrypted.<br>Firewalls and Proxies are designed to manage and monitor network traffic.<br>WAF protects web applications from targeted attacks.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which of the following terms best describes a vulnerability in software that is unknown to its creator?<\/strong><br>a) Zero-day<br>b) Open source<br>c) Backdoor<br>d) Logic bomb<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> a) Zero-day<br><em>Explanation:<\/em><br>Zero-day refers to a software vulnerability that is unknown to those who should be interested in mitigating the vulnerability.<br>Open source refers to software with publicly accessible source code.<br>A backdoor provides an alternative way of accessing a system.<br>A logic bomb is malicious code that executes in response to certain conditions.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What type of access control is based on job roles within an organization?<\/strong><br>a) MAC (Mandatory Access Control)<br>b) DAC (Discretionary Access Control)<br>c) RBAC (Role-Based Access Control)<br>d) Rule-Based Access Control<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) RBAC (Role-Based Access Control)<br><em>Explanation:<\/em><br>RBAC assigns permissions based on roles within an organization.<br>MAC labels data and grants access based on those labels.<br>DAC allows users to grant permissions on their own data.<br>Rule-Based Access Control provides access based on a set of predefined security rules.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which malware type disguises itself as legitimate software to deceive users?<\/strong><br>a) Worm<br>b) Trojan<br>c) Virus<br>d) Ransomware<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Trojan<br><em>Explanation:<\/em><br>Trojans present themselves as legitimate software but hide malicious functionalities.<br>Worms replicate themselves to spread across networks.<br>Viruses attach to files and require user intervention to spread.<br>Ransomware encrypts user data and demands payment for decryption.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Which of the following is a common method for securely erasing data from a storage device so that it cannot be easily recovered?<\/strong><br>a) Defragmentation<br>b) Formatting<br>c) Zeroization<br>d) Compression<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Zeroization<br><em>Explanation:<\/em><br>Zeroization involves overwriting storage sectors with zeros, rendering the original data virtually irrecoverable.<br>Defragmentation rearranges fragmented data to make a drive operate more efficiently.<br>Formatting prepares a storage device for use and may not securely erase all data.<br>Compression reduces the size of files but does not erase them.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Practice 3<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>1. What concept involves splitting data into pieces and distributing it across multiple locations?<\/strong><br>a) De-identification<br>b) Data Masking<br>c) Sharding<br>d) Tokenization<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Sharding<br><em>Explanation:<\/em><br>Sharding involves splitting data and distributing it to enhance performance and manageability.<br>De-identification involves anonymizing data to protect privacy.<br>Data Masking obfuscates specific data within a database.<br>Tokenization replaces sensitive elements with non-sensitive equivalents.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>2. Which of the following protocols provides secure file transfer capabilities?<\/strong><br>a) FTP<br>b) SFTP<br>c) HTTP<br>d) SNMP<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) SFTP<br><em>Explanation:<\/em><br>SFTP provides secure file transfer capabilities using secure shell (SSH).<br>FTP is a standard network protocol for file transfer but is not secure.<br>HTTP is used for transmitting hypertext requests and is also not secure.<br>SNMP is used for managing devices on IP networks.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>3. Which security concept ensures that modifications to data are not made without detection?<\/strong><br>a) Authentication<br>b) Integrity<br>c) Availability<br>d) Confidentiality<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Integrity<br><em>Explanation:<\/em><br>Integrity ensures that data remains unchanged from its source during storage or transmission.<br>Authentication confirms an entity&#8217;s identity.<br>Availability ensures that resources are accessible when needed.<br>Confidentiality prevents unauthorized access to data.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>4. Which technology ensures the confidentiality of data in transit over unsecured networks, such as the internet?<\/strong><br>a) VPN<br>b) NIDS<br>c) Firewall<br>d) Antivirus<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> a) VPN<br><em>Explanation:<\/em><br>VPN (Virtual Private Network) ensures confidentiality and secure data transmission over unsecured networks.<br>NIDS (Network Intrusion Detection System) monitors network traffic for suspicious activity.<br>Firewalls protect networks by controlling internet traffic.<br>Antivirus software protects against malicious software.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>5. What type of security testing involves analyzing code without executing it?<\/strong><br>a) Static Testing<br>b) Dynamic Testing<br>c) Stress Testing<br>d) Penetration Testing<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> a) Static Testing<br><em>Explanation:<\/em><br>Static Testing involves analyzing code without executing it, focusing on code, design, and documentation.<br>Dynamic Testing involves analyzing code by executing it.<br>Stress Testing tests system performance under unfavorable conditions.<br>Penetration Testing assesses a system\u2019s ability to withstand attacks.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>6. Which protocol uses port 443 by default?<\/strong><br>a) HTTP<br>b) HTTPS<br>c) FTP<br>d) SSH<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) HTTPS<br><em>Explanation:<\/em><br>HTTPS uses port 443 by default and ensures secure, encrypted communication over the web.<br>HTTP uses port 80 and is unsecured.<br>FTP (File Transfer Protocol) uses ports 20 and 21.<br>SSH (Secure Shell) uses port 22.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>7. Which regulatory legislation concerns the protection of personal data for EU citizens?<\/strong><br>a) HIPAA<br>b) GDPR<br>c) FISMA<br>d) SOX<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) GDPR<br><em>Explanation:<\/em><br>GDPR (General Data Protection Regulation) protects the personal data of EU citizens and applies to organizations handling such data.<br>HIPAA (Health Insurance Portability and Accountability Act) relates to healthcare information in the USA.<br>FISMA (Federal Information Security Management Act) applies to US federal agencies.<br>SOX (Sarbanes-Oxley Act) concerns financial information for publicly traded companies in the USA.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>8. Which principle of information security requires that no single individual should have complete control over a process or system?<\/strong><br>a) Principle of Least Privilege<br>b) Separation of Duties<br>c) Defense in Depth<br>d) Open Design<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Separation of Duties<br><em>Explanation:<\/em><br>Separation of Duties involves distributing tasks and privileges among multiple people, which reduces the risk of a single point of failure or misuse.<br>The Principle of Least Privilege entails granting only the minimum levels of access \u2014 or permissions \u2014 needed to accomplish tasks.<br>Defense in Depth implements multiple layers of security controls.<br>Open Design assumes the system&#8217;s security does not depend on its architecture being secret.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>9. Which of the following best describes a cryptographic salt?<\/strong><br>a) A password<br>b) Random data appended to passwords before hashing<br>c) An encryption algorithm<br>d) A secret key used for symmetric encryption<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Random data appended to passwords before hashing<br><em>Explanation:<\/em><br>A cryptographic salt is random data that is combined with a password before the resulting data is subjected to a cryptographic hash function. This method helps defend against dictionary attacks and pre-computed rainbow table attacks by creating unique hashes, even if users have identical passwords.<br>A password is a secret word or string of characters used for user authentication.<br>An encryption algorithm is a method used to transform readable data into unreadable data.<br>A secret key used for symmetric encryption does not describe a cryptographic salt.<br><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>10. Which of the following is a feature of Public Key Infrastructure (PKI)?<\/strong><br>a) Key exchange<br>b) Hash function<br>c) Digital certificates<br>d) Antivirus scanning<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Digital certificates<br><em>Explanation:<\/em><br>PKI (Public Key Infrastructure) involves the use of digital certificates to establish a hierarchy of trust, facilitating the secure exchange of keys and providing a framework that manages digital keys and certificates.<br>Key exchange refers to the process of exchanging cryptographic keys between entities, which can be part of the PKI but is not a feature per se.<br>A hash function is a cryptographic function but not a PKI feature.<br>Antivirus scanning is unrelated to PKI and pertains to malware detection and prevention.<\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Practice 4<\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>1. In which type of attack does the attacker disguise themselves as a trusted entity to deceive victims?<\/strong><br>a) Replay Attack<br>b) Phishing Attack<br>c) Brute Force Attack<br>d) Salting<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Phishing Attack<br><em>Explanation:<\/em><br>Phishing attacks involve attackers disguising themselves as trusted entities, often through email or other communication forms, to deceive victims into revealing sensitive information.<br>Replay attacks involve capturing and resending data.<br>Brute force attacks involve trying multiple combinations to gain access.<br>Salting is a cryptographic technique, not an attack.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>2. What best describes the primary purpose of an Intrusion Detection System (IDS)?<\/strong><br>a) Preventing malicious traffic from entering a network<br>b) Detecting and alerting about potential intrusions<br>c) Encrypting data in transit<br>d) Auditing and logging all network traffic<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Detecting and alerting about potential intrusions<br><em>Explanation:<\/em><br>An IDS monitors networks for malicious activities or policy violations and produces reports to a management station.<br>Preventing malicious traffic from entering a network<strong>:<\/strong> More the role of a firewall or an IPS (Intrusion Prevention System).<br>Encrypting data in transit: Encryption&#8217;s job, not the function of IDS.<br>Auditing and logging all network traffic: While IDS may log events, its primary purpose isn&#8217;t to log all network traffic.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>3. Which type of firewall filters traffic based on the state of the connection?<\/strong><br>a) Packet-Filtering Firewall<br>b) Proxy Firewall<br>c) Stateful Firewall<br>d) Application Firewall<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Stateful Firewall<br><em>Explanation:<\/em><br>Stateful firewalls maintain a table of active connections and make decisions based on the context of the traffic.<br>Packet-Filtering Firewall: Filters packets primarily based on source\/destination IP, ports, and protocol, not on state.<br>Proxy Firewall:<strong> <\/strong>Acts as an intermediary, not necessarily considering the state of the connection.<br>Application Firewall<strong>:<\/strong> Focuses on specific application traffic but not necessarily on the state of the connection.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>4.<\/strong> <strong>What does the principle of non-repudiation ensure in cybersecurity?<\/strong><br>a) That data remains confidential<br>b) That users cannot deny the authenticity of their actions<br>c) That data is available when needed<br>d) That users can be authenticated<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) That users cannot deny the authenticity of their actions<br><em>Explanation:<\/em><br>Non-repudiation ensures that a party cannot deny an action they performed, typically ensuring the authenticity of data origin and integrity.<br>That data remains confidential: This is the principle of confidentiality.<br>That data is available when needed: This describes availability.<br>That users can be authenticated: Refers to authentication, not non-repudiation.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>5. Which technology obscures an internal IP address by mapping it to a public IP address for outbound traffic?<\/strong><br>a) DMZ<br>b) NAT<br>c) MAC Address Filtering<br>d) VPN<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) NAT<br><em>Explanation:<\/em><br>Network Address Translation (NAT) allows a device to present itself under a different IP, often used to hide internal IP structures.<br>DMZ: A perimeter network exposed to the public, but doesn&#8217;t map internal to public IPs.<br>MAC Address Filtering: Operates at the data link layer, based on hardware addresses, not IP addresses.<br>VPN: While it can mask an IP address, it doesn\u2019t specifically map internal to public IPs in the way NAT does.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>6. What type of security assessment is performed without prior knowledge of the infrastructure being tested?<\/strong><br>a) White box testing<br>b) Black box testing<br>c) Grey box testing<br>d) Static testing<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Black box testing<br><em>Explanation:<\/em><br>In black box testing, the tester does not have prior knowledge of the infrastructure, mimicking an external attack.<br>White box testing: The tester has full knowledge of the system being tested.<br>Grey box testing: The tester has partial knowledge of the system.<br>Static testing: A form of testing where code is not executed; more relevant to software development.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>7. What is the main purpose of a digital signature?<\/strong><br>a) Encrypt data<br>b) Verify the integrity and authenticity of data<br>c) Store private keys<br>d) Facilitate key exchange<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> b) Verify the integrity and authenticity of data<br><em>Explanation:<\/em><br>Digital signatures ensure the data&#8217;s integrity and verify the authenticity of the data source.<br>Encrypt data: This is the role of encryption, not signatures.<br>Store private keys: Key storage is not the purpose of a digital signature.<br>Facilitate key exchange: This is related to secure key exchange mechanisms, not digital signatures.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>8. Which cybersecurity practice divides a network into multiple segments to manage and control access?<\/strong><br>a) Load Balancing<br>b) Network Address Translation<br>c) Network Segmentation<br>d) Intrusion Detection<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) Network Segmentation<br><em>Explanation:<\/em><br>Network Segmentation involves dividing a network into smaller parts to increase security and performance.<br>Load Balancing: Distributes network traffic across servers but doesn&#8217;t segment the network.<br>Network Address Translation: Converts private IPs to public IPs for external communications, but doesn&#8217;t inherently segment a network.<br>Intrusion Detection: Monitors for potential threats; doesn&#8217;t segment a network.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>9. Which of the following refers to a security concept where multiple layers of security controls are placed throughout an information technology system?<\/strong><br>a) Defense in Depth<br>b) Principle of Least Privilege<br>c) Single Point of Failure<br>d) Risk Diversification<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> a) Defense in Depth<br><em>Explanations:<\/em><br>Defense in Depth: This strategy employs multiple layers of security controls to protect resources and data. If one layer is bypassed or fails, the next layer should stop the threat.<br>Principle of Least Privilege: This ensures that users have only the permissions essential to perform their roles. It&#8217;s not about layered security, but about minimizing permissions.<br>Single Point of Failure: Refers to any component (system, part, etc.) that can cause the entire system to fail if it itself fails. It&#8217;s about system reliability, not layered security.<br>Risk Diversification: This isn&#8217;t a standard term in IT security. Diversification generally refers to spreading out investments to reduce risk in the finance world.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>10. Which of the following best describes a Zero-Day vulnerability?<\/strong><br>a) A flaw for which a patch is readily available at discovery<br>b) A vulnerability known to the public for more than thirty days<br>c) A vulnerability that has been exploited before its public disclosure<br>d) An issue that affects systems running for more than 24 hours continuously<\/summary>\n<p class=\"wp-block-paragraph\"><strong>Answer:<\/strong> c) A vulnerability that has been exploited before its public disclosure<br><em>Explanations:<\/em><br>A flaw for which a patch is readily available at discovery: This is not a Zero-Day; if a patch is available immediately, then it&#8217;s known and addressed by vendors before becoming public. <br>A vulnerability known to the public for more than thirty days: This doesn&#8217;t define a Zero-Day; the term refers to the lack of available fixes, not the duration the vulnerability has been public. <br>A vulnerability that has been exploited before its public disclosure: This is the essence of a Zero-Day. It&#8217;s a vulnerability that attackers exploit before there&#8217;s an official fix or even before its wide public acknowledgment. <br>An issue that affects systems running for more than 24 hours continuously: This is unrelated to the term &#8220;Zero-Day&#8221; in cybersecurity.<\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n","protected":false},"excerpt":{"rendered":"<p>The questions provided below are not sourced from any question bank. They are designed to assess your knowledge across various domains in cybersecurity. While these questions can be utilized as practice for a range of certifications, including but not limited to Security+, CISSP, and CISM, it&#8217;s important to note that they are generic. The format [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[41],"tags":[34,37,38,40,35,15,30,39,27,36,31,26],"class_list":["post-393","post","type-post","status-publish","format-standard","hentry","category-practice-tests","tag-certifications","tag-cism","tag-cissp","tag-cyber-security","tag-cyber-security-practice-tests","tag-deception-tactics","tag-incident-response","tag-information-security","tag-risk-management","tag-security","tag-security-operations","tag-vulnerability-management"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pgs2Ve-6l","_links":{"self":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/posts\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/comments?post=393"}],"version-history":[{"count":14,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/posts\/393\/revisions"}],"predecessor-version":[{"id":432,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/posts\/393\/revisions\/432"}],"wp:attachment":[{"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/media?parent=393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/categories?post=393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digisentinel.org\/index.php\/wp-json\/wp\/v2\/tags?post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}